中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 会议论文

view all items

(Results 1-20 of 142)
Help
Items/Page:    Sort:
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing [会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang; Meining Nie; Purui Su; Dengguo Feng
  |  View/Download:9/2
 
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming [会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang; Xiaoqi Jia; Dengguo Feng; Shengzhi Zhang; Peng Liu
  |  View/Download:13/1
 
fault propagation pattern based relevant faulty ciphertexts filtering towards dfa on aes [会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Wang Na; Zhou Yongbin
  |  View/Download:4/0
 
on enumeration of polynomial equivalence classes and their application to mpkc [会议论文]
on enumeration of polynomial equivalence classes and their application to mpkc, 北京, 2010
Lin Dongdai; Faug&#; re Jean-Charles; Perret Ludovic; Wang Tianze
  |  View/Download:10/2
 
hyper-sbox view of aes-like permutations: a generalized distinguisher [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wu Shuang; Feng Dengguo; Wu Wenling; Su Bozhan
  |  View/Download:2/0
 
gateway-oriented password-authenticated key exchange protocol with stronger security [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Wei Fushan; Ma Chuangui; Zhang Zhenfeng
  |  View/Download:4/0
 
results on the immunity of boolean functions against probabilistic algebraic attacks [会议论文]
16th Australasian Conference on Information Security and Privacy, ACISP 2011, Melbourne, VIC, Australia, 11-Jul-02
Liu Meicheng; Lin Dongdai; Pei Dingyi
  |  View/Download:5/0
 
a short signature scheme from the rsa family [会议论文]
13th Information Security Conference, ISC 2010, Boca Raton, FL, United states, 25-Oct
Yu Ping; Xue Rui
  |  View/Download:4/0
 
on the security of a bidirectional proxy re-encryption scheme from pkc 2010 [会议论文]
14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, Taormina, Italy, 6-Mar-02
Weng Jian; Zhao Yunlei; Hanaoka Goichiro
  |  View/Download:3/1
 
on the invisibility of designated confirmer signatures [会议论文]
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22,
Xia Fubiao; Wang Guilin; Xue Rui
  |  View/Download:2/0
 
linear approximations of addition modulo 2n-1 [会议论文]
18th International Workshop on Fast Software Encryption, FSE 2011, Lyngby, Denmark, 1-Feb
Zhou Chunfang; Feng Xiutao; Wu Chuankun
  |  View/Download:3/0
 
lblock: a lightweight block cipher [会议论文]
9th International Conference on Applied Cryptography and Network Security, ACNS 2011, Nerja, Spain, 7-Jun-20
Wu Wenling; Zhang Lei
  |  View/Download:1/0
 
how to characterize side-channel leakages more accurately? [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye; Zhou Yongbin; Han Yang; Li Jiantang; Yang Shuguo; Feng Dengguo
  |  View/Download:3/0
 
general construction of chameleon all-but-one trapdoor functions [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Liu Shengli; Lai Junzuo; Deng Robert H.
  |  View/Download:5/1
 
polye+ctr: a swiss-army-knife mode for block ciphers [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Zhang Liting; Wu Wenling; Wang Peng
  |  View/Download:4/0
 
loiss: a byte-oriented stream cipher [会议论文]
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo; Feng Xiutao; Zhang Wentao; Fan Xiubin; Wu Chuankun
  |  View/Download:7/0
 
video steganography with perturbed motion estimation [会议论文]
13th International Conference on Information Hiding, IH 2011, Prague, Czech republic, 18-May-20
Cao Yun; Zhao Xianfeng; Feng Dengguo; Sheng Rennong
  |  View/Download:3/0
 
value-based program characterization and its application to software plagiarism detection [会议论文]
33rd International Conference on Software Engineering, ICSE 2011, Waikiki, Honolulu, HI, United states, 21-May-20
Jhi Yoon-Chan; Wang Xinran; Jia Xiaoqi; Zhu Sencun; Liu Peng; Wu Dinghao
  |  View/Download:3/1
 
exploiting fm radio data system for adaptive clock calibration in sensor networks [会议论文]
9th International Conference on Mobile Systems, Applications, and Services, MobiSys'11 and Co-located Workshops, Bethesda, MD, United states, 28-Jun-02
Li Liqun; Xing Guoliang; Sun Limin; Huangfu Wei; Zhou Ruogu; Zhu Hongsong
  |  View/Download:2/0
 
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng; Zhang Zhenfeng; Feng Dengguo
  |  View/Download:2/0
 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace